Search For:

Displaying 1-10 out of 10 total
Thwarting E-mail Spam Laundering
Found in: ACM Transactions on Information and System Security (TISSEC)
By Haining Wang, Heng Yin, Heng Yin, Heng Yin, Mengjun Xie, Mengjun Xie, Mengjun Xie
Issue Date:December 2008
pp. 1-32
Laundering e-mail spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in the underground e-mail spam industry. Spammers have plagued the Internet by exploiting a large number of spam pro...
     
Manipulating semantic values in kernel data structures: Attack assessments and implications
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Aravind Prakash,Eknath Venkataramani,Heng Yin,Zhiqiang Lin
Issue Date:June 2013
pp. 1-12
Semantic values in kernel data structures are critical to many security applications, such as virtual machine introspection, malware analysis, and memory forensics. However, malware, or more specifically a kernel rootkit, can often directly tamper with the...
 
Study on Monitoring and Control System for Rotor Online Dynamic Balancing Based on DSP&FPGA
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Zhi Jingjuan,Jing Minqing,Fan Hongwei,Liu Heng,Yin Mingquan
Issue Date:January 2013
pp. 1072-1075
Rotor mass unbalance always brings great damage to the rotating machines. The off-line balancing can reduce unbalance, but it can only be implemented when the rotor is stopped, which lowers the production efficiency and causes great economic loss. A real-t...
 
Bus Monitoring System Based on ZigBee and GPRS
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Feng He,Lulu Li,Heng Yin,Xia Huang
Issue Date:March 2012
pp. 178-181
Presently, public traffic system mainly depends on driver's manual operation, which will inevitably encounter many problems such as punctuality of the bus's arrival on bus station. Paper proposes an supervisory system based on GPRS and ZigBee technology, t...
 
On the Trustworthiness of Memory Analysis —An Empirical Study from the Perspective of Binary Execution
Found in: IEEE Transactions on Dependable and Secure Computing
By Aravind Prakash,Eknath Venkataramani,Heng Yin,Zhiqiang Lin
Issue Date:February 2015
pp. 1
Memory analysis serves as a foundation for many security applications such as memory forensics, virtual machine introspection and malware investigation. However, malware, or more specifically a kernel rootkit, can often tamper with kernel memory data, putt...
 
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis
Found in: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments (VEE '12)
By Lok-Kwong Yan, Manjukumar Jayachandra, Heng Yin, Mu Zhang
Issue Date:March 2012
pp. 227-238
A transparent and extensible malware analysis platform is essential for defeating malware. This platform should be transparent so malware cannot easily detect and bypass it. It should also be extensible to provide strong support for heavyweight instrumenta...
     
Attacks on WebView in the Android system
Found in: Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11)
By Hao Hao, Heng Yin, Tongbo Luo, Wenliang Du, Yifei Wang
Issue Date:December 2011
pp. 343-352
WebView is an essential component in both Android and iOS platforms, enabling smartphone and tablet apps to embed a simple but powerful browser inside them. To achieve a better interaction between apps and their embedded "browsers", WebView provides a numb...
     
Emulating emulation-resistant malware
Found in: Proceedings of the 1st ACM workshop on Virtual machine security (VMSec '09)
By Dawn Song, Heng Yin, Min Gyung Kang, Stephen McCamant, Steve Hanna
Issue Date:November 2009
pp. 11-22
The authors of malware attempt to frustrate reverse engineering and analysis by creating programs that crash or otherwise behave differently when executed on an emulated platform than when executed on real hardware. In order to defeat such techniques and f...
     
An effective defense against email spam laundering
Found in: Proceedings of the 13th ACM conference on Computer and communications security (CCS '06)
By Haining Wang, Heng Yin, Mengjun Xie
Issue Date:October 2006
pp. 179-190
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spammers have been plaguing the Internet by exploiting a large number of spam pro...
     
A Robust Dynamic Watermarking Scheme Based on STBDW
Found in: Computer Science and Information Engineering, World Congress on
By Zhu Jian-qi, Liu Yan-heng, Yin Ke, Yin Ke-xin
Issue Date:April 2009
pp. 602-606
Software piracy is a major concern for organizations that create, use, and distribute digital content. Software watermarking is such a technique for protecting software by embedding secret information into the software to identify its copyright owner. This...
 
 1